EPOS Trust Center

EPOS Digital Solutions are built for data security and compliance.

How is EPOS securing your data?

EPOS is committed to applying the highest security and compliance standards when it comes to your data. Internal and external processes and third-party audits are all set up to make EPOS a secure and trusted partner.

Security

EPOS protects your data at rest and in transit in your on-premises or cloud deployments. Enterprise-grade security with rigorous controls ensure secure and efficient management of your EPOS devices.

Data Security

- Data encryption at-rest
- Data encryption in-transit

Product Security

- Logging and frequent monitoring
- Access management
- Secure development process

Corporate Security

- Security trainings
- Vendor management
- SOC II policies
- Facilities security

Compliance

EPOS is GDPR compliant and uses the System and Organization Control (SOC) Type I as a framework for yearly audits. These audits verify the top-level security in data storage as well as internal security policies, processes and employee onboarding and training.


The purpose of the SOC II report is to help you understand the controls established by EPOS to support operations and compliance.

Need more information regarding the SOC II report?

Contact us

FAQ

Explore EPOS Digital Solutions

EPOS Manager

Save time and drive efficiency through remote update deployments and get insights into how to improve workplace productivity.

Learn More

EPOS Connect

Update company devices with the latest firmware and personalize audio device settings to ensure flawless operation for end-users.

Learn more

EPOS Developer Portal

A simple, scalable, and secure platform for partners and customers to access all EPOS APIs and SDKs

Learn More

Vulnerability Disclosure Policy

Our products show compliance to different mandatory EU directives by either an EU DOC (self-declaration) or EU type examination certificate.

Learn more

EPOS vulnerability disclosure Policy follows our RED Certification. This policy includes:

  • Contact information for the reporting of issues; and
  • Information on timelines for:
    • Initial acknowledgement of receipt; and
    • Status updates until the resolution of the reported issues.

Contact



Contact software support with your concerns about security and vulnerabilities with subject line: vulnerability_report

We display all open vulnerabilities reported from our customers:


List of reported vulnerabilities:

  • No open vulnerabilities reported


List of open vulnerabilities:

  • No open vulnerabilities